Monthly Archives: April 2012
Application Security Locks Down DB2
Application Security Inc. has put out the beta for an IBM DB2 version of the companys AppDetective tool, a network-based, penetration testing tool and...
IBM Takes on Privacy
Since Harriet Pearson was appointed IBMs first chief privacy officer two years ago, she has dedicated herself to creating privacy policies and initiatives that...
Symantec Acknowledges Activation Bug, Posts Fix
Symantec Corp. Monday acknowledged a problem with the activation feature included in many of its latest product releases, and posted a fix to solve...
Microsoft’s Open-Source Subsidiary Releases First Deliverable
Microsoft has announced the release of an updated version of the Redis on Windows, the first deliverable from the company's Microsoft Open Technologies subsidiary.Redis...
Symantec Revamps Security Architecture
Symantec Corp. last week unveiled a sweeping new security architecture as well as a new set of technologies, which are designed to correlate and...
Inside the Mind of a Hacker
It may sound contradictory, but the hacker behind the Month of Kernel Bugs, or MOKB, project actually said he believes in responsible disclosure. Throughout...
Microsoft Office Under Siege
Duration: 10:12
/zimages/6/28571.gifClick here to download this podcast.
/zimages/6/28571.gif
/util_get_image/1/0,3363,i=114836,00.gifTo subscribe to eWEEK podcasts, click here.
/zimages/6/28571.gifCheck out eWEEK.coms for the latest podcasts by eWEEK analysts, editors and...
Enterprise Resource Protection
Entries in this category are designed to ensure that IT data and computing resources are used only by authorized personnel in approved ways. As...
Real Security for Wireless LANs
Have you stayed away from wireless LANs (WLANs) because of their notorious lack of security? If so, its time to take another look. The...
Hack Nap
During the typical holiday season, with high school and college students on vacation and when people generally have more time on their hands, far...